Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Security in computing
Bookmark Share

Text

Security in computing

Pfleeger, Charles P. - Personal Name; Pfleeger, Shari Lawrence - Personal Name;

Contents:

Chapter 1. Is There a Security Problem in Computing?
1.1. What Does Secure Mean?
1.2. Attacks
1.3. The Meaning of Computer Security
1.4. Computer Criminals
1.5. Methods of Defense
1.6. What's Next
1.7. Summary
1.8. Terms and Concepts
1.9. Where the Field is Headed
1.10. To Learn More
1.11. Exercise

Chapter 2. Elementary Cryptography
2.1. Termonilogy and Background
2.2. Substitution Characters
2.3. Transpotitions (Permutation)
2.4. Making Good Encryption Algorithm
2.5. The Data Encryption Standard
2.6. The AES Encryption Algorithm
2.7. Public Key Encryption
2.8. The Uses of Cryptography
2.9. Summary of Encryption
2.10. Terms and Concepts
2.11. Where The Field is Headed
2.12. To Learn More
2.13. Exercises

Chapter 3. Program Security
3.1. Secure Programs
3.2. Nonmalicious Program Errors
3.3. Viruses and Other Malicious Code
3.4. Targeted Malicious Code
3.5. Controls Against Program Threats
3.6. Summary of Program Threats and Controls
3.7. Terms and Concepts
3.8. Where The Field is Headed
3.9. To Learn More
3.10. Exercises

Chapter 4. Protection in General-Purpose Operating Systems
4.1. Protected Objects and Methods of Protection
4.2. Memory and Address Protection
4.3. Control of Access to General Objects
4.4. File Protection Mechanisms
4.5. User Authentication
4.6. Summary of Security of Users
4.7. Terms and Concepts
4.8. Where the Field is Headed
4.9. To Learn More
4.10. Exercises

Chapter 5. Designing Trusted Operating Systems
5.1. What is a Trusted System?
5.2. Security Policies
5.3. Models of Security
5.4. Trusted Operating System Design
5.5. Assurance in Trusted Operating System
5.6. Summary of Security in Operating System
5.7. Terms and Concepts
5.8. Where the Field is Headed
5.9. To Learn More
5.10. Exercises

Chapter 6. Database and Data Mining Security
6.1. Introduction to Databases
6.2. Security Requirement
6.3. Reliability and Integrity
6.4. Sensitive Data
6.5. Inference
6.6. Multilevel Databases
6.7. Proposals for Multilevel Security
6.8. Data Mining
6.9. Summary of Database Security
6.10. Terms and Concepts
6.11. Where the Field is Headed
6.12. To Learn More
6.13. Exercises

Chapter 7. Security in Networks
7.1. Network Concepts
7.2. Threats in Networks
7.3. Network Security Controls
7.4. Firewalls
7.5. Intrution Detection Systems
7.6. Secure E-mail
7.7. Summary of Network Security
7.8. Term and Concepts
7.9. Where the Field is Headed
7.10. To Learn More
7.11. Exercises

Chapter 8. Administering Security
8.1. Security Planning
8.2. Risk Analysis
8.3. Organizational Security Policies
8.4. Physical Security
8.5. Summary
8.6. Terms and Concepts
8.7. To Learn More
8.8. Exercises

Chapter 9. The Economics of Cybersecurity
9.1. Making a Business Case
9.2. Quantifying Security
9.3. Modelling Cybersecurity
9.4. Current Research and Future Directions
9.5. Summary
9.6. Terms and Concepts
9.7. To Learn More
9.8. Exercises

Chapter 10. Privacy and Computing
10.1. Pricacy Concepts
10.2. Provacy Principles and Policies
10.3. Authentication and Privacy
10.4. Data Mining
10.5. Privacy on the Web
10.6. E-mail Security
10.7. Impacts on Emerging Technologies
10.8. Summary
10.9. Terms and Concepts
10.10. Where the Field is Headed
10.11. To Learn More
10.12. Exercises

Chapter 11. Legal and Ethical Issues in Computing Security
11.1. Protecting Programs and Data
11.2. Information and the Law
11.3. Rights of Employees and Employers'
11.4. Redress for Software Failures
11.5. Computer Crime
11.6. Ethical Issues in Computer Security
11.7. Case Studies of Ethics
11.8. Terms and Concepts
11.9. To Learn More
11.10. Exercises

Chapter 12. Cryptography Explained
12.1. Mathematics for Cryptography
12.2. Symmetric Encryption
12.3. Public Key Encryption Systems
12.4. Quantum Cryptography
12.5. Summary of Encryption
12.6. Terms and Concepts
12.7. Where the Field is Headed
12.8. To Learn More
12.9. Exercises


Availability
#
Perpustakaan Poltek SSN 225
000 00602
Available
Detail Information
Series Title
--
Call Number
004 PFL s
Publisher
New Jersey : Pearson Education, Inc.., 2007
Collation
xxix, 845 hlm.; ilus.; 24 cm
Language
English
ISBN/ISSN
0136012965
Classification
004
Content Type
-
Media Type
-
Carrier Type
-
Edition
Fourth Edition
Subject(s)
-
Specific Detail Info
--
Statement of Responsibility
Charles P. Pfleeger and Shari Lawrence Pfleeger
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?